Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

Audit Approach is designed for audit/assurance professionals who seek IT audit training, internal audit training or internal control training on how to perform specific audits. These audit training courses provide the structure and background to permit the professional to initiate and execute an assessment in any of these topical areas.

Training Courses

Auditing IT -Enabled Application Systems (AA02)

This seminar prepares the business auditor to perform audits of IT-enabled application systems.

Auditing IT Outsourced Environments (AA06)

Whether it includes outsourcing IT operations, application maintenance, systems development, applications services, information security, networking. or cloud, they all constitute outsourcing.

Auditing Your CyberSecurity Program: Top to Bottom (AA28) – NEW

In this highly practical and intensive workshop, CyberSecurity audits.

Introduction to IT Auditing (AA01)

The course will introduce the fundamentals of IT auditing, core drivers behind why it is a specialized area of auditing, evolution of IT assurance, and the principle objectives of IT auditing and its relationship to integrated financial or operational auditing. It will introduce the role of IT auditing and how IT audit strategies can enhance non-IT audits.

IT Audit Academy (AA09)

The course will introduce the fundamentals of IT auditing, core drivers behind why it is a specialized area of auditing, evolution of IT assurance, and the principle objectives of IT auditing and its relationship to integrated financial or operational auditing. It will introduce the role of IT auditing and how IT audit strategies can enhance non-IT audits.

Planning and Conducting IT General Controls Reviews (AA03)

This seminar focuses on the planning, execution, and reporting of general IT controls reviews.

The Essentials of Payment Card Systems Auditing (AA27)

Learn the highlights of the CyberSecurity controls necessary to satisfy PCI DSS requirements will be presented using a practical, commonsense methodology that emphasizes a top-down, structured implementation approach to day-to-day business operations.